CN108768619B - Working method of strong PUF circuit based on ring oscillator - Google Patents

Working method of strong PUF circuit based on ring oscillator Download PDF

Info

Publication number
CN108768619B
CN108768619B CN201810586232.8A CN201810586232A CN108768619B CN 108768619 B CN108768619 B CN 108768619B CN 201810586232 A CN201810586232 A CN 201810586232A CN 108768619 B CN108768619 B CN 108768619B
Authority
CN
China
Prior art keywords
circuit
ring oscillator
input
counter circuit
counter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810586232.8A
Other languages
Chinese (zh)
Other versions
CN108768619A (en
Inventor
胡鹏
周昱
张�荣
魏敬和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 58 Research Institute
Original Assignee
CETC 58 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 58 Research Institute filed Critical CETC 58 Research Institute
Priority to CN201810586232.8A priority Critical patent/CN108768619B/en
Publication of CN108768619A publication Critical patent/CN108768619A/en
Application granted granted Critical
Publication of CN108768619B publication Critical patent/CN108768619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Abstract

The invention provides a strong PUF circuit based on a ring oscillator and a working method thereof, belonging to the technical field of information security and cryptography. The strong PUF circuit based on the ring oscillator comprises a ring oscillator array circuit, a data selection circuit, a first counter circuit, a second counter circuit, a data comparator circuit, a serial-parallel conversion circuit and an AES encryption circuit. The ring oscillator structure is combined with an AES encryption circuit, so that the characteristic requirement of a strong PUF is met. And the circuit structure is multiplexed to the greatest extent, the circuit overhead is greatly reduced, the structure is flexible and simple, the generated secret key is high in uniqueness and reliability, and the requirement that the strong PUF has massive excitation-response pairs can be met.

Description

Working method of strong PUF circuit based on ring oscillator
Technical Field
The invention relates to the technical field of information security and cryptography, in particular to a strong PUF circuit based on a ring oscillator and a working method thereof.
Background
A ring oscillator is a closed loop formed by a string of an odd number of inverters connected in series with an oscillation period equal to the sum of all delays from the first to the last stage. Thus, the magnitude of the propagation delay of a digital signal is a function of the electrical parameters of the component that the signal encounters on the path. These device electronic parameters include MOSFET channel length, width, and threshold voltage, all of which are affected to varying degrees by uncontrollable variations in the manufacturing process. Therefore, the propagation delay of the digital signal will exhibit partial randomness, influenced by the specific physical entity, exhibiting a physical unclonable behavior at the time of measurement.
Until now, foreign markets have mature Physical Unclonable Function (PUF) products in commerce. The United states Intrinsic-ID company, as an industry leader, has applied its products to smart cards, automobiles, FPGAs, logistics and government fields in recent years, especially in deep cooperation with NXP and Altera. The company's solution not only eliminates the need for non-volatile storage for storage keys for next generation chips, but also applies to existing systems. With a PUF the key can be extracted from the hardware properties of the chip (like the biometric fingerprint of the chip) when needed. Since there is no key in the power-off state, a hacker cannot crack any information, and conventionally the key is permanently stored in non-volatile memory.
In the existing digital PUF technology, a ring oscillator structure, an arbiter structure, an SRAM memory structure, and the like are mainly used. Compared with the characteristic that a strong PUF has massive excitation-response pairs, the conventional PUF can only generate a small number of random bit sequences, and the performance cannot meet the requirement.
Disclosure of Invention
The invention aims to provide a strong PUF circuit based on a ring oscillator and a working method thereof, and aims to solve the problems that the existing PUF circuit is low in performance, and a generated key is not unique and poor in reliability.
In order to solve the technical problems, the invention provides a strong PUF circuit based on a ring oscillator and a working method thereof, wherein the strong PUF circuit based on the ring oscillator comprises a ring oscillator array circuit, a data selection circuit, a first counter circuit, a second counter circuit, a data comparator circuit, a serial-parallel conversion circuit and an AES encryption circuit;
the ring oscillator array circuit comprises N +1 paths of ring oscillator circuits, N is a natural number not less than 128, the output end of each path of ring oscillator circuit is connected with the data input end of the data selection circuit, and the input end of each path of ring oscillator circuit is connected with the same pulse signal;
a first output end of the data selection circuit is connected with an input end of the first counter circuit, and a second output end of the data selection circuit is connected with an input end of the second counter circuit;
the output end of the first counter circuit is connected with the first input end of the data comparator circuit, and the output end of the second counter circuit is connected with the second input end of the data comparator circuit;
the output end of the data comparator circuit is connected with the input end of the serial-parallel conversion circuit;
and the output end of the serial-parallel conversion circuit is connected with the key input end of the AES encryption circuit.
Optionally, each ring oscillator circuit includes 1 two-input nand gate and 2 × k +1 not gates connected in series in sequence, one input end of the two-input nand gate is connected to the pulse signal, and the other input end of the two-input nand gate is connected to an output end of the 2 × k not gate in the same ring oscillator circuit, where k is a natural number greater than 0.
Optionally, reset signal input ends of the first counter circuit and the second counter circuit are both connected to a reset signal.
Optionally, a selection signal input end of the data selection circuit is connected to a selection signal.
Optionally, the first counter circuit and the second counter circuit use an M-bit counter, and a value of M is set according to a frequency of the clock signal.
The invention also provides a working method of the strong PUF circuit based on the ring oscillator, which comprises the following steps:
step 1, inputting a pulse signal to an input end of an N + 1-path ring oscillator circuit, and starting oscillation to generate N +1 clock signals with different frequencies;
step 2, the data selection circuit inputs a selection signal, and clock signals of two adjacent paths of ring oscillator circuits corresponding to the selection signal are respectively input to a first counter circuit and a second counter circuit;
step 3, the first counter circuit and the second counter circuit respectively count the clock signals input by the first counter circuit and the second counter circuit, and input two obtained count values into the data comparator circuit;
step 4, the data comparator circuit compares the count values input by the first counter circuit and the second counter circuit, and outputs a comparison result;
step 5, traversing the selection signals in sequence, and repeatedly executing the step 2 to the step 4 until the output of the comparison result corresponding to the last group of adjacent ring oscillator circuits is completed;
step 6, forming the output results into a group of character strings, selecting continuous 128 bits from the character strings, converting the character strings into parallel 128-bit-length data through a serial-parallel conversion circuit, and inputting the data serving as a key into an AES encryption circuit;
step 7, the AES encryption circuit obtains a corresponding 128-bit response aiming at any 128-bit excitation, thereby forming an excitation-response pair; due to the sufficient data bit width, a large number of stimulus-response pairs can be generated.
Optionally, step 4 specifically includes:
if the count value input by the first counter circuit is larger than the count value input by the second counter circuit, the data comparator circuit outputs 0; the data comparator circuit outputs a 1 when the count value input by the first counter circuit is less than the count value input by the second counter circuit;
if the count value input by the first counter circuit is larger than the count value input by the second counter circuit, the data comparator circuit outputs 1; then the data comparator circuit outputs 0 when the count value input by the first counter circuit is less than the count value input by the second counter circuit.
Optionally, the operation method of the ring oscillator-based strong PUF circuit further includes:
when the selection signal is changed, a reset signal is input to the first counter circuit and the second counter circuit to reset the count values thereof to 0.
Optionally, the key of the AES encryption circuit is 128 bits long, and the excitation-response pair is also 128 bits long.
The invention provides a strong PUF circuit based on a ring oscillator and a working method thereof. The ring oscillator structure is combined with an AES encryption circuit, so that the characteristic requirement of a strong PUF is met. And the circuit structure is multiplexed to the greatest extent, the circuit overhead is greatly reduced, the structure is flexible and simple, the generated secret key is high in uniqueness and reliability, and the requirement that the strong PUF has massive excitation-response pairs can be met.
Drawings
FIG. 1 is a schematic diagram of a strong PUF circuit based on a ring oscillator;
fig. 2 is a schematic diagram of a ring oscillator array circuit.
Detailed Description
The strong PUF circuit based on a ring oscillator and the operation method thereof proposed by the present invention are further described in detail with reference to the drawings and the specific embodiments. Advantages and features of the present invention will become apparent from the following description and from the claims. It is to be noted that the drawings are in a very simplified form and are not to precise scale, which is merely for the purpose of facilitating and distinctly claiming the embodiments of the present invention.
Example one
The first embodiment of the invention provides a strong PUF circuit based on a ring oscillator, as shown in fig. 1, to generate a large number of excitation-response pairs with high reliability. The ring oscillator-based strong PUF circuit includes a ring oscillator array circuit 10, a data selection circuit 11, a first counter circuit 12, a second counter circuit 13, a data comparator circuit 14, a serial-parallel conversion circuit 15, and an AES encryption circuit 16.
Specifically, the ring oscillator array circuit 10 includes at least 129 ring oscillator circuits 100, an output end of each ring oscillator circuit 100 is connected to a data input end of the data selection circuit 11, and input ends of each ring oscillator circuit 100 are connected to the same pulse signal. After the pulse signal arrives, each ring oscillator circuit 100 starts to oscillate to generate and output a clock signal. Because each route has different time delay, the route with prolonged time is caused, the oscillation frequency is low, the route with short time delay is caused, and the oscillation frequency is high. A first output end of the data selection circuit 11 is connected to an input end of the first counter circuit 12, a second output end of the data selection circuit 11 is connected to an input end of the second counter circuit 13, and a selection signal input end of the data selection circuit 11 is connected to a selection signal. An output end of the first counter circuit 12 is connected with a first input end of the data comparator circuit 14, and an output end of the second counter circuit 13 is connected with a second input end of the data comparator circuit 14; the reset signal input ends of the first counter circuit 12 and the second counter circuit 13 are both connected with a reset signal, so that when the selection signal changes, the count values in the first counter circuit 12 and the second counter circuit 13 are reset to 0. The output end of the data comparator circuit 14 is connected with the input end of the serial-parallel conversion circuit 15; the output end of the serial-parallel conversion circuit 15 is connected with the key input end of the AES encryption circuit 16. The serial-to-parallel conversion circuit 15 converts the 128-bit data generated serially by the data comparison circuit 14 into a parallel 128-bit key data output, and the AES encryption circuit 16 key adopts a 128-bit length, and the excitation and the response of the AES encryption circuit are respectively 128-bit length.
Specifically, in order to ensure that the first counter circuit 12 and the second counter circuit 13 can correctly count the clock signal, the first counter circuit 12 and the second counter circuit 13 use an M-bit counter, and in practical application, a value of M is set according to a frequency of the clock signal.
Fig. 2 is a schematic structural diagram of the ring oscillator array circuit 10. The ring oscillator array circuit 10 includes N +1 ring oscillator circuits 100. Each ring oscillator circuit 100 includes 1 two-input nand gate and 2 × k +1 not gates connected in series in sequence, one input end of the two-input nand gate is connected to a pulse signal, and the other input end is connected to an output end of the 2 × k not gate in the same ring oscillator circuit, where k is a natural number greater than 0, and can be flexibly configured according to actual needs and circuit conditions. When a 1-bit pulse signal is input, a clock signal of N +1 bits will be output.
In addition, in the actual circuit design, the layout and the wiring of each ring oscillator circuit 100 need to conform to the wiring rules of adjacent arrangement, symmetrical arrangement and internal wiring.
Example two
Based on the strong PUF circuit based on the ring oscillator provided in the first embodiment, a second embodiment of the present invention provides a working method of the strong PUF circuit based on the ring oscillator, where the ring oscillator array circuit 10 includes N +1 ring oscillator circuits 100, N is a natural number greater than 0, and the working method of the strong PUF circuit based on the ring oscillator includes the following steps:
the method comprises the following steps: inputting a pulse signal at an input terminal of the N + 1-path ring oscillator circuit 100, wherein the N + 1-path ring oscillator circuit 100 starts oscillating to generate N +1 clock signals with different frequencies;
step two: inputting a selection signal to a data selection circuit 11, wherein the data selection circuit 11 respectively inputs clock signals of two adjacent paths of ring oscillator circuits corresponding to the selection signal to a first counter circuit 12 and a second counter circuit 13; specifically, for convenience of description, the two adjacent ring oscillator circuits may be referred to as the ith ring oscillator circuit 100 and the (i + 1) th ring oscillator circuit 100, where i is a natural number greater than 0 and less than or equal to N. The data selection circuit 11 inputs the clock signal of the ith ring oscillator circuit 100 in the two adjacent ring oscillator circuits to the first counter circuit 12, and inputs the clock signal of the (i + 1) th ring oscillator circuit 100 in the two adjacent ring oscillator circuits to the second counter circuit 13;
step three: the first counter circuit 12 and the second counter circuit 13 respectively count respective input clock signals, and input two obtained count values to the data comparator circuit 14; correspondingly, the first counter circuit 12 counts the clock signal of the ith ring oscillator circuit 100, and inputs the obtained first count value to the first input end of the data comparator circuit 14; the second counter circuit 13 counts the clock signal of the (i + 1) th ring oscillator circuit 100, and inputs the obtained second count value to the second input terminal of the data comparator circuit 14. Specifically, the first count value and the second count value are both supplied to the data comparator circuit 14 in the form of circuit signals;
step four: the data comparator circuit 14 compares the count values input from the first counter circuit 12 and the second counter circuit 13, and outputs a comparison result. Specifically, if the first count value is greater than the second count value, the data comparator circuit 14 outputs 0, and if the first count value is less than the second count value, the data comparator circuit 14 outputs 1; if the data comparator circuit 14 outputs a 1 when the first count value is greater than the second count value, then the data comparator circuit 14 outputs a 0 when the first count value is less than the second count value.
Step five, traversing the selection signals in sequence through an external circuit, and repeatedly executing the step two to the step four until the output of the comparison result corresponding to the last group of adjacent ring oscillator circuits is completed; specifically, the selection signals sequentially include 0 to (N-1), when the traversed selection signal is j, the data selection circuit 11 selects the clock signals output by the jth ring oscillator circuit 100 and the jth +1 ring oscillator circuit 100, and j is a natural number greater than or equal to 0 and less than or equal to N-1;
in order to ensure the accuracy of counting the clock signals output by the two newly selected ring oscillator circuits 100 after the selection signal is changed, when the selection signal input to the data selection circuit 11 is changed, a reset signal is input into the first counter circuit 12 and the second counter circuit 13 to control the count value to be reset to 0;
and step six, finally obtaining a group of character strings consisting of N binary numerical values, namely the key root character strings. Selecting continuous 128 bits from the character string, converting the continuous 128 bits into parallel 128-bit-length data through a serial-parallel conversion circuit 15, and inputting the parallel 128-bit-length data into an AES encryption circuit 16 as a key;
and step seven, after the AES encryption circuit 16 obtains the key input, corresponding 128-bit response can be obtained for any 128-bit excitation, so that an excitation-response pair is formed. With sufficient data bit width, a large number of stimulus-response pairs can be generated.
Specifically, the length N of the key root string may be flexibly configured according to actual requirements and circuit conditions.
EXAMPLE III
In the third embodiment, the working process of the strong PUF circuit based on the ring oscillator under the coordination of the peripheral circuit is described by taking the length of the 1024-bit key root string as an example.
In the third embodiment, the ring oscillator array circuit 10 includes 1025 ring oscillator circuits 100, each ring oscillator circuit 100 is formed by connecting in series 1 two-input nand gate and 9 not gates, and two input terminals of the nand gate are respectively connected to the pulse signal and the feedback signal output by the 8 th not gate. The data selection circuit 11 selects 2 by 2015, both counters are 32 bits, and the data comparator circuit 14 has a data bit width of 32 bits, i.e., N =1024, M =32, and k =4 in the first and second embodiments.
With the circuit, the strong PUF circuit based on the ring oscillator has the following working steps:
after power-on initialization, the pulse signal is temporarily set to "1" and then to "0", the 2015-circuit ring oscillator array circuit 100 starts to oscillate to generate different frequency outputs, first, the data selection circuit 11 inputs the selection signal 10'd 0, and the data selection circuit 11 selects the output results of the 0 th and 1 st ring oscillator circuits 100 and transmits the results to the first counter 12 and the second counter 13, respectively. At this time, the values in the two counters are incremented rapidly, and assuming that the path delay of the 0 th ring oscillator circuit 100 is smaller than the path delay of the 1 st ring oscillator circuit 100, which means that the frequency of the 0 th ring oscillator is higher than the frequency of the 1 st ring oscillator, the value of the first counter 12 must be larger than the value of the second counter 13. Thus, the data comparator circuit 14 produces an output of "1".
Under the control of the peripheral circuit, after 1ms, the reset signal set to "1" resets the two counters and changes the selection signal to 10 d' 1 at the same time, and at this time, the data selection circuit 11 selects the output results of the 1 st and 2 nd ring oscillator circuits 100 and transfers them to the first counter 12 and the second counter 13, respectively. Assuming that the 1 st ring oscillator circuit 100 path delay is greater than the 2 nd ring oscillator circuit 100 path delay, meaning that the 1 st ring oscillation frequency is lower than the 2 nd ring oscillation, then the value of the first counter 12 must be less than the value of the second counter 13. Thus, data comparator circuit 14 produces an output of "0".
Repeating the above steps, after the selection signal traverses 10d '0 to 10 d' 1023, the circuit outputs to obtain a complete serial bit data stream containing 1024-bit key root character strings. Continuous 128 bits are arbitrarily selected from the key data, and after the serial-parallel conversion circuit 15 processes the key data, a 128-bit key is generated to be used as the key input of the AES encryption circuit 16. For any stimulus, the AES encryption circuit 16 may use key encryption to obtain a corresponding response, forming a stimulus-response pair. The whole process takes about 1 s.
In summary, by using a ring oscillator PUF-based circuit to generate an inter-chip unique key, an AES encryption circuit is enabled to generate an inter-chip unique response, constituting a strong PUF. And on the basis, the circuit structure is multiplexed to the greatest extent, the circuit overhead is greatly reduced, the structure is flexible and simple, the generated secret key is high in uniqueness and reliability, and the requirement that the strong PUF has massive excitation-response pairs can be met.
The above description is only for the purpose of describing the preferred embodiments of the present invention, and is not intended to limit the scope of the present invention, and any variations and modifications made by those skilled in the art based on the above disclosure are within the scope of the appended claims.

Claims (3)

1. A working method of a strong PUF circuit based on a ring oscillator comprises a ring oscillator array circuit, a data selection circuit, a first counter circuit, a second counter circuit, a data comparator circuit, a serial-parallel conversion circuit and an AES encryption circuit; the ring oscillator array circuit comprises N +1 paths of ring oscillator circuits, N is a natural number not less than 128, the output end of each path of ring oscillator circuit is connected with the data input end of the data selection circuit, and the input end of each path of ring oscillator circuit is connected with the same pulse signal; a first output end of the data selection circuit is connected with an input end of the first counter circuit, and a second output end of the data selection circuit is connected with an input end of the second counter circuit; the output end of the first counter circuit is connected with the first input end of the data comparator circuit, and the output end of the second counter circuit is connected with the second input end of the data comparator circuit; the output end of the data comparator circuit is connected with the input end of the serial-parallel conversion circuit; the output end of the serial-parallel conversion circuit is connected with the key input end of the AES encryption circuit;
each ring oscillator circuit comprises 1 two-input NAND gate and 2 x k +1 NOT gates which are sequentially connected in series, wherein one input end of each two-input NAND gate is connected with a pulse signal, and the other input end of each two-input NAND gate is connected with the output end of the 2 x k NOT gate in the same ring oscillator circuit, wherein k is a natural number greater than 0;
reset signal input ends of the first counter circuit and the second counter circuit are both connected with reset signals;
the selection signal input end of the data selection circuit is connected with a selection signal;
the first counter circuit and the second counter circuit adopt M-bit counters, and the value of M is set according to the frequency of a clock signal;
the working method of the strong PUF circuit based on the ring oscillator is characterized by comprising the following steps of:
step 1, inputting a pulse signal to an input end of an N + 1-path ring oscillator circuit, and starting oscillation to generate N +1 clock signals with different frequencies;
step 2, the data selection circuit inputs a selection signal, and clock signals of two adjacent paths of ring oscillator circuits corresponding to the selection signal are respectively input to a first counter circuit and a second counter circuit;
step 3, the first counter circuit and the second counter circuit respectively count the clock signals input by the first counter circuit and the second counter circuit, and input two obtained count values into the data comparator circuit;
step 4, the data comparator circuit compares the count values input by the first counter circuit and the second counter circuit, and outputs a comparison result; if the count value input by the first counter circuit is greater than the count value input by the second counter circuit, the data comparator circuit outputs 0, and if the count value input by the first counter circuit is less than the count value input by the second counter circuit, the data comparator circuit outputs 1; if the count value input by the first counter circuit is greater than the count value input by the second counter circuit, the data comparator circuit outputs 1, and if the count value input by the first counter circuit is less than the count value input by the second counter circuit, the data comparator circuit outputs 0;
step 5, traversing the selection signals in sequence, and repeatedly executing the step 2 to the step 4 until the output of the comparison result corresponding to the last group of adjacent ring oscillator circuits is completed;
step 6, forming the output results into a group of character strings, selecting continuous 128 bits from the character strings, converting the character strings into parallel 128-bit-length data through a serial-parallel conversion circuit, and inputting the data serving as a key into an AES encryption circuit;
step 7, the AES encryption circuit obtains a corresponding 128-bit response aiming at any 128-bit excitation, thereby forming an excitation-response pair; due to the sufficient data bit width, a large number of stimulus-response pairs can be generated.
2. The method of claim 1, further comprising:
when the selection signal is changed, a reset signal is input to the first counter circuit and the second counter circuit to reset the count values thereof to 0.
3. The method of claim 1, wherein the key of the AES encryption circuit is 128 bits long and the stimulus-response pair is also 128 bits long.
CN201810586232.8A 2018-06-08 2018-06-08 Working method of strong PUF circuit based on ring oscillator Active CN108768619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810586232.8A CN108768619B (en) 2018-06-08 2018-06-08 Working method of strong PUF circuit based on ring oscillator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810586232.8A CN108768619B (en) 2018-06-08 2018-06-08 Working method of strong PUF circuit based on ring oscillator

Publications (2)

Publication Number Publication Date
CN108768619A CN108768619A (en) 2018-11-06
CN108768619B true CN108768619B (en) 2021-07-06

Family

ID=63999739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810586232.8A Active CN108768619B (en) 2018-06-08 2018-06-08 Working method of strong PUF circuit based on ring oscillator

Country Status (1)

Country Link
CN (1) CN108768619B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919764B (en) * 2017-03-07 2020-03-17 合肥工业大学 Reliability detection method for ring oscillator physical unclonable function based on FPGA
CN110545174A (en) * 2019-08-16 2019-12-06 浙江大华技术股份有限公司 circuit for generating secret key and information encryption and decryption method
CN110677255A (en) * 2019-09-24 2020-01-10 中国电子科技集团公司第五十八研究所 Strong PUF (physical unclonable function) working circuit and method based on SRAM (static random Access memory)
CN111082925B (en) * 2019-10-23 2021-07-30 中山大学 Embedded system encryption protection device and method based on AES algorithm and PUF technology
CN111355589B (en) * 2020-01-16 2021-02-19 南京航空航天大学 Reconfigurable ring oscillator physical unclonable function circuit and excitation generation method thereof
CN111865615B (en) * 2020-07-30 2022-07-19 南京博芯电子技术有限公司 APUF circuit with detectable reliability and working method
CN113507362B (en) * 2021-07-08 2022-04-01 电子科技大学 RO PUF secret key generation method based on quadruple comparison strategy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521538A (en) * 2011-12-07 2012-06-27 浙江大学 Physical no-cloning function structure based on multi-frequency band
CN105743645A (en) * 2016-01-25 2016-07-06 清华大学 PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
CN105811923A (en) * 2016-02-29 2016-07-27 中国电子科技集团公司第五十八研究所 Clock duty ratio adjusting circuit
CN107483180A (en) * 2017-08-21 2017-12-15 湖南大学 A kind of high stability physics unclonable function circuit and its response production method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011054410B4 (en) * 2011-10-12 2014-09-25 Infineon Technologies Ag Device and method for generating a bit sequence
US20150188717A1 (en) * 2013-12-26 2015-07-02 Wei Wu Physically unclonable function redundant bits
WO2015148659A1 (en) * 2014-03-25 2015-10-01 Mai Kenneth Wei-An Methods for generating reliable responses in physical unclonable functions (pufs) and methods for designing strong pufs
US9787481B2 (en) * 2014-08-28 2017-10-10 The Regents Of The University Of Michigan Physical unclonable function using augmented memory for challenge-response hashing
CN104579631A (en) * 2014-12-15 2015-04-29 天津大学 AES (Advanced Encryption Standard) secret key generation structure and method based on latch type voltage sensitive amplifier PUF (Physical Unclonable Function)
JP6587188B2 (en) * 2015-06-18 2019-10-09 パナソニックIpマネジメント株式会社 Random number processing apparatus, integrated circuit card, and random number processing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521538A (en) * 2011-12-07 2012-06-27 浙江大学 Physical no-cloning function structure based on multi-frequency band
CN105743645A (en) * 2016-01-25 2016-07-06 清华大学 PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
CN105811923A (en) * 2016-02-29 2016-07-27 中国电子科技集团公司第五十八研究所 Clock duty ratio adjusting circuit
CN107483180A (en) * 2017-08-21 2017-12-15 湖南大学 A kind of high stability physics unclonable function circuit and its response production method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于CMOS环型振荡器0~100MHz高线性低功耗时钟发生器";刘心彤,李振荣,庄奕琪;《微电子学与计算机》;20180305 *

Also Published As

Publication number Publication date
CN108768619A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN108768619B (en) Working method of strong PUF circuit based on ring oscillator
CA2971212C (en) Reliability enhancement methods for physically unclonable function bitstring generation
CN109614790B (en) Lightweight authentication equipment and authentication method based on feedback loop PUF
CN103299576B (en) Bit generating apparatus and bit generation method
CN109460681B (en) Configurable physical unclonable function circuit based on delay chain
CN108509180B (en) Low-power-consumption random number generation device based on two-input exclusive-OR gate
CN102968290B (en) A kind of true Random Number Generator of isomery lightweight
KR101987141B1 (en) Random number generator
CN109167664B (en) Reconfigurable ring oscillator PUF circuit based on exclusive-OR gate
CN112713894B (en) Strong and weak mixed PUF circuit
CN106878014A (en) Random number key generation device and random number key production method
CN111027102A (en) High-safety configurable RO-PUF circuit structure
CN108932438B (en) Multimode mixed reconfigurable PUF unit circuit based on linear feedback
CN113672199A (en) Multi-entropy source random number generator with physical unclonable function
CN108540109A (en) Physical fingerprint generative circuit based on ring oscillator and method
CN110750233B (en) Random number generator based on logic gate asymmetric autonomous Boolean network
CN116992499A (en) Lightweight M_SR PUF circuit and system based on FPGA
Peinado et al. Improving the period and linear span of the sequences generated by DLFSRs
Göncü et al. A high speed true random number generator with cellular automata with random memory
CN111078191A (en) Pseudo-random number generation method based on FPGA hardware implementation
CN113946882B (en) Schmitt trigger-based ultralow-power-consumption weak physical unclonable function circuit
Zacharias et al. Chaotic ring oscillator based true random number generator implementations in fpga
PV et al. Design and implementation of efficient stochastic number generator
CN114357539A (en) Frequency-controllable PUF circuit based on ring oscillator
CN106293615A (en) True Random Number Generator based on fully connected network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant